US20130332739A1 - Method of sharing a session key between wireless communication terminals using a variable-length authentication code - Google Patents

Method of sharing a session key between wireless communication terminals using a variable-length authentication code Download PDF

Info

Publication number
US20130332739A1
US20130332739A1 US14/000,645 US201214000645A US2013332739A1 US 20130332739 A1 US20130332739 A1 US 20130332739A1 US 201214000645 A US201214000645 A US 201214000645A US 2013332739 A1 US2013332739 A1 US 2013332739A1
Authority
US
United States
Prior art keywords
authentication code
terminal
medium value
key
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US14/000,645
Other versions
US9078126B2 (en
Inventor
Jeong Hyun Yi
Gun-Il Ma
Hyeong Chan Lee
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foundation of Soongsil University Industry Cooperation
Original Assignee
Foundation of Soongsil University Industry Cooperation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Foundation of Soongsil University Industry Cooperation filed Critical Foundation of Soongsil University Industry Cooperation
Assigned to SOONGSIL UNIVERSITY RESEARCH CONSORTIUM TECHNO-PARK reassignment SOONGSIL UNIVERSITY RESEARCH CONSORTIUM TECHNO-PARK ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LEE, HYEONG CHAN, MA, Gun-Il, YI, JEONG HYUN
Publication of US20130332739A1 publication Critical patent/US20130332739A1/en
Application granted granted Critical
Publication of US9078126B2 publication Critical patent/US9078126B2/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/047Key management, e.g. using generic bootstrapping architecture [GBA] without using a trusted network node as an anchor
    • H04W12/0471Key exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/65Environment-dependent, e.g. using captured environmental data

Definitions

  • the present invention relates to a method of sharing a session key between wireless communication terminals using a variable-length authentication code, and more particularly, to a method of sharing a session key between wireless communication terminals using a variable-length authentication code, whereby the session key can be shared in a state in which high security between near-distance wireless communication terminals is maintained.
  • a payment service application using a mobile phone among many mobile applications has been spotlighted as service that may give much convenience to users.
  • various payment means such as a mobile wallet
  • a payment service of the mobile wallet is carried out through wireless communication between various near-distance wireless terminals.
  • wireless communication is basically vulnerable to attack.
  • a secure session management technique between near-distance terminals is positively necessary to carry out various services using a mobile terminal.
  • a technique of sharing a secret key between both communication terminals is necessary for secure session management.
  • the most known method of sharing a secret key is a Diffie-Hellman (DH) protocol, which is vulnerable to man-in-the-middle attack.
  • DH Diffie-Hellman
  • Many key exchanging techniques including a station-to-station (STS) protocol have been proposed so as to solve the problem of man-in-the-middle attack.
  • STS station-to-station
  • TTP trusted third party
  • they are not suitable for use in a mobile payment service. This is because it is difficult for a payment service using a mobile phone to have a previously-shared value with various communication terminals or to have a common TTP, such as a Public Key Infrastructure (PKI).
  • PKI Public Key Infrastructure
  • the present invention provides a method of sharing a session key between wireless communication terminals using a variable-length authentication code, whereby the session key can be shared in a state in which high security between near-distance wireless communication terminals is maintained.
  • a method of sharing a session key between wireless communication terminals based on a Diffie-Hellman (DH) protocol including: generating a public key by using an own private key; generating a message including the public key and a first random number and encoding the message using an own secret key to exchange an encrypted message with the other terminal; decoding the encrypted message of the other terminal by receiving a secret key of the other terminal; generating an authentication code by calculating the first random number and a second random number included in the decoded message; obtaining a medium value from the authenticated code; and generating a session key by using a public key included in the decoded message of the other terminal.
  • DH Diffie-Hellman
  • the message may further include an identifier and a reflection attack verification value.
  • the method may further include checking a reflection attack verification value of the other terminal included in the decoded message.
  • the secret key may be a disposable key, and the first and second random numbers may be comprised of bit streams having a value of 0 or 1.
  • the generating of the authentication code may include generating an authentication code by performing an exclusive OR operation on the first random number and the second random number.
  • the authentication code may be divided into n bits (where n is a natural number of 2 or more), the divided authentication code may correspond to one grid, and each grid may be indicated by one color.
  • the obtaining of the medium value from the authentication code may include: dividing the authentication code into 2 or more bits and inputting the divided authentication code to an out-of-band (OOB) function to obtain the medium value; and displaying the medium value on a screen including a plurality of grids.
  • OOB out-of-band
  • the number S′ of grids required to display the medium value may be obtained by the following equation:
  • S is the number of grids required when the number of colors for displaying the medium value is 2
  • k is the number of colors used to display the medium value and is 2 m (where m is a number of bits to the divided authentication code).
  • the obtaining of the medium value from the authentication code may include: inputting the authentication code to an OOB function to obtain the medium value; and controlling a plurality of light emitting diodes (LEDs) to turn on or off according to the medium value.
  • LEDs light emitting diodes
  • the obtaining of the medium value from the authentication code may include: inputting the authentication code to an OOB function to obtain the medium value; and playing a stored sound source file according to the medium value.
  • a wireless communication terminal for sharing a session key with the other terminal based on a Diffie-Hellman (DH) protocol
  • the wireless communication terminal including: a storage unit including a public key generated by using an own private key; an encoding unit generating a message including the public key and a first random number and encoding the message using an own secret key to exchange an encrypted message with the other terminal; a decoding unit decoding the encrypted message of the other terminal by receiving a secret key of the other terminal; an authentication code generating unit generating an authentication code by calculating the first random number and a second random number included in the decoded message; an out-of-band (OOB) converting unit obtaining a medium value from the authenticated code; and a session key generating unit generating a session key by using a public key included in the decoded message of the other terminal.
  • OOB out-of-band
  • an authentication code having a short length is used, increased usability can be expected when an authentication technique is used through an OOB channel.
  • the length of the authentication code can be adjusted according to a level of a security need of an application so that a compromise effect of usability and security can be attained.
  • various authentication methods such as a comparing color barcode (CCB) method, a comparing multi LEDs (CML) method, and a comparing music (CM) method, are provided according to various usage environments of a wireless communication terminal so that direct session key authentication can be more easily performed.
  • FIG. 1 is a view illustrating a structure of a wireless communication terminal according to an embodiment of the present invention
  • FIG. 2 is a flowchart illustrating a method of setting a session key between wireless communication terminals according to an embodiment of the present invention
  • FIG. 3 is a flowchart illustrating the method of setting a session key between wireless communication terminals illustrated in FIG. 2 in more detail;
  • FIG. 4 is a view illustrating an operation of obtaining a medium value using a comparing color barcode (CCB) method by using an out-of-band (OOB) converting unit according to an embodiment of the present invention
  • FIG. 5 is a view illustrating a state in which the medium value of an OOB function obtained using the operation of FIG. 4 is displayed on a screen;
  • FIG. 6 is a view illustrating an operation of obtaining a medium value using a comparing multi LEDs (CML) method by using the OOB converting unit according to another embodiment of the present invention
  • FIG. 7 is a view illustrating a state in which the medium value of an OOB function obtained using the operation of FIG. 6 is displayed on an LED;
  • FIG. 8 is a view illustrating an operation of obtaining a medium value using a comparing music (CM) method by using the OOB converting unit according to another embodiment of the present invention.
  • FIG. 9 illustrates a screen on which a music file is played according to the medium value of an OOB function obtained using the operation of FIG. 8 .
  • FIG. 1 is a view illustrating a structure of a wireless communication terminal according to an embodiment of the present invention.
  • a wireless communication terminal 100 illustrated in FIG. 1 that is a device for sharing a session key between near-distance wireless communication terminals may refer to a mobile station (MS), a mobile terminal (MT), a subscriber station (SS), a portable subscriber station (PSS), user equipment (UE), or an access terminal (AT) or may include functions of all or part of the MT, the SS, the PSS, and the UE.
  • MS mobile station
  • MT mobile terminal
  • SS subscriber station
  • PSS portable subscriber station
  • UE user equipment
  • AT access terminal
  • the wireless communication terminal 100 includes a storage unit 110 , an encoding unit 120 , a decoding unit 130 , an authentication code generating unit 140 , an out-of-band (OOB) converting unit 150 , and a session key generating unit 160 .
  • a storage unit 110 an encoding unit 120 , a decoding unit 130 , an authentication code generating unit 140 , an out-of-band (OOB) converting unit 150 , and a session key generating unit 160 .
  • OOB out-of-band
  • the storage unit 110 stores a public key, an identifier identification (ID), a random number, and a secret key, which are generated using an own private key of the wireless communication terminal 100 , and stores the random number and the secret key that are randomly selected.
  • ID identifier identification
  • secret key which are generated using an own private key of the wireless communication terminal 100 , and stores the random number and the secret key that are randomly selected.
  • the encoding unit 120 generates a message including an attack verification value, the identifier ID, the public key, and the random number, and encodes the generated message by using an own secret key to exchange the encrypted message with an encrypted message of the other terminal.
  • a symmetric-key encryption algorithm is used to transmit values of the random number and the public key.
  • the decoding unit 130 decodes the encrypted message of the other terminal by using a received secret key of the other terminal and authenticates the attack verification value of the decoded message.
  • the authentication code generating unit 140 generates an authentication code by calculating a random number of the other terminal included in the decoded message and an own random number.
  • the authentication code generating unit 140 uses an exclusive OR value of the random number as the authentication code, instead of a hash value of a shared key (session key).
  • the OOB converting unit 150 obtains a medium value by applying the authentication code to an OOB function.
  • color barcodes are used to perform a method of authenticating the medium value between two terminals, whereby the session key can be authenticated by simply comparing coidentity of the color barcodes, not by recognizing the medium value through a camera module, like in an existing black-and-white barcode.
  • the session key generating unit 160 generates a session key by using a public key of the other terminal included in the decoded message.
  • FIG. 2 is a flowchart illustrating a method of setting a session key between wireless communication terminals according to an embodiment of the present invention
  • FIG. 3 is a flowchart illustrating the method of setting a session key between wireless communication terminals illustrated in FIG. 2 in more detail.
  • wireless communication terminals according to the current embodiment of the present invention are represented by a first terminal and a second terminal, and the first terminal and the second terminal are terminals that perform near field communication (NFC) by using Zigbee, RFID, Bluetooth based on the Diffie-Hellman (DH) protocol.
  • NFC near field communication
  • DH Diffie-Hellman
  • identifier IDs e.g., e-mail addresses that a human being can identify and DH public key values PK A and PK B are set in the first terminal and the second terminal (S 211 , S 212 ).
  • the identifier IDs set in the first terminal and the second terminal may be represented by ID A and ID B , as illustrated in FIG. 3 .
  • the DH public key value PK A set in the first terminal is generated using a private key (a) of the first terminal (g a modp)
  • the DH public key value PK B set in the second terminal is generated using a private key (b) of the second terminal (g b modp).
  • the first terminal and the second terminal select k-bit random numbers N A and N B and t-bit disposable secret keys SK A and SK B randomly (S 213 , S 214 ).
  • the random numbers N A and N B are comprised of k bit steams having a bit value of 0 or 1
  • the random numbers N A and N B comprised of various bit streams can be generated by adjusting a k-value.
  • the disposable secret keys SK A and SK B are comprised of t bit streams having a bit value of 0 or 1
  • values of the disposable secret keys SK A and SK B may vary frequency.
  • the first terminal and the second terminal generate messages m A and m B so as to exchange the public key values PK A and PK B with each other (S 215 , S 216 ).
  • the messages m A and m B include an attack verification value (0 or 1) for verifying a reflection attack, own IDs ID A and ID B , own public key values PK A and PK B , and own random numbers N A and N B .
  • the message m A generated by the first terminal may be represented by 0 ⁇ ID A ⁇ PK A ⁇ N A
  • the message m B generated by the second terminal may be represented by 1 ⁇ ID B ⁇ PK B ⁇ N B
  • a reflection attack verification value 0 means a transmission terminal
  • a reflection attack verification value 1 means a receipt terminal.
  • the first terminal and the second terminal encode the generated messages m A and m B by using own secret keys SK A and SK B (S 217 , S 218 ).
  • the first terminal and the second terminal exchange messages E(SK A , m A ) and E(SK B , m B ) that are encoded by the secret keys SK A and SK B , with each other (S 219 ).
  • the first terminal transmits own secret key SK A to the second terminal, if it receives the encrypted message E(SK B , m B ) from the second terminal (S 220 ).
  • the second terminal that receives the secret key SK A of the first terminal decodes the encrypted message E(SK A , m A ) by using the secret key SK A (D(SK A , E(SK A , m A ) (S 221 ).
  • the second terminal After the second terminal checks whether a reflection attack verification value of 0 is present in a decoded message m′ A (S 222 ), if it is checked that the reflection attack verification value of 0 is present in the decoded message m′ A , the second terminal transmits own secret key SK B to the first terminal (S 223 ).
  • the first terminals that receives the secret key SK B of the second terminal decodes the encrypted message E(SK B , m B ) by using the secret key SK B (D(SK B , E(SK B , m B ) (S 224 ).
  • the first terminal checks whether a reflection attack verification value of 1 is present in a decoded message m′ B (S 225 ).
  • the first terminal and the second terminal calculate their own random number values and transmitted random number values to generate authentication codes (S 226 , S 227 ). That is, the second terminal calculates an own random number value N B and a random number value N′ A received from the first terminal to generate an authentication code CV B , and the first terminal calculates an own random number value N A and a random number value N′ B received from the second terminal to generate an authentication code CV A .
  • the authentication code generating unit 140 calculates random number values by using exclusive OR.
  • the first terminal and the second terminal apply the authentication codes CV A and CV B to an OOB function so as to generate medium values O A and O B of an OOB channel that a user can directly recognize visually or auditorily (S 228 , S 229 ). That is, the first terminal applies the authentication code CV A to the OOB function to obtain the output medium value O A , and the second terminal applies the authentication code CV B to the OOB function to obtain the output medium value O B .
  • the OOB channel includes a visual channel and an auditory channel that use a visual sense and an auditory sense of the human being.
  • a medium value is represented by melody, music, and an effect sound
  • a medium value is represented by a barcode and color.
  • the human being can select a first terminal and a second terminal that are object terminals and can verify authentication information of the selected object terminals, it can be identified that an attacker modulates a message or counterfeits a device to be authenticated without a trusted third party (TTP).
  • TTP trusted third party
  • the first terminal and the second terminal can share the session key K AB by using a symmetric-key encryption algorithm based on the DH protocol, instead of hash.
  • OOB channel authentication in OOB channel authentication (Phase 3 ), one among a comparing color barcode (CCB) method, a comparing multi LEDs (CML) method, and a comparing music (CM) method can be utilized.
  • CB color barcode
  • CML comparing multi LEDs
  • CM comparing music
  • FIG. 4 is a view illustrating an operation of obtaining a medium value using a CCB method by using an OOB converting unit according to an embodiment of the present invention.
  • the left drawing of FIG. 4 shows an operation of applying an authentication code CV to an OOB function
  • the right drawing of FIG. 4 shows that a medium value O is visually displayed on a screen of a terminal through an OOB visual channel.
  • the OOB function is a function to convert an input value into a medium value having a visual or auditory shape.
  • the authentication code CV is comprised of (k+1) bits (0 ⁇ k). Then, the authentication code CV is divided into 2 bits and is input to the OOB converting unit 150 (C 00 , C 01 , C O2 , . . . C ij ), and the OOB to converting unit 150 represents an output medium value of the OOB function on a grid i ⁇ j through previously-designated four colors.
  • the OOB converting unit 150 may set 00-bit to red color 1, 01-bit to white color 2, 10-bit to blue color 3, and 11-bit to black color 4 and may display color corresponding to the authentication code CV that is divided into 2 bits and is input to the OOB converting unit 150 on a screen of the grid i ⁇ j.
  • color selection may be performed to smoothly differentiate between colors based on the relationship of compensation color.
  • the authentication code CV is divided into 2 or more bits, and when the authentication code CV is divided into m bits, the authentication code may be represented by 2 m colors. Also, as a m-value increases, the number or size of grids displayed on the screen may decrease. The divided authentication code CV is represented in one grid, and each grid is indicated by one color.
  • the authentication code CV is not divided and thus a medium value can be displayed by a black-and-white grid (or barcode) of two colors, whereas, according to an embodiment of the present invention, the authentication code CV is divided into 2 or more bits and thus the medium value can be displayed with various colors and the number or size of grids can be remarkably reduced.
  • Equation 1 the number of grids required to display the medium value by using the black-and-white grid, like in the related art, is S, the number S′ of grids required to display the medium is reduced, as shown in Equation 1:
  • k is the number of colors used to display the medium value and is 2 m (where m is a number of bits to the divided authentication code CV) has a value of 2 or more.
  • FIG. 5 is a view illustrating a state in which the medium value of an OOB function obtained using the operation of FIG. 4 is displayed on a screen.
  • the medium value of the OOB function is displayed on an operating screen when a random number having a length of 128 bits is used as the authentication code CV, by using four colors.
  • the authentication code can be represented by using only 64 grids that is a half of 128 grids required in the related art, as checked from Equation 1.
  • an authentication code having a short length is used, increased usability can be expected when an authentication technique is used through the OOB channel. Also, since adjustment of the length of the authentication code is flexible, the length of the authentication code is adjusted according to a level of a security need of an application so that a compromise effect of usability and security can be attained. Also, since a color grid can be represented by the size or number of grids that is a half of the size or number of existing black-and-white grids, the user can perform session key authentication more easily.
  • FIG. 6 is a view illustrating an operation of obtaining a medium value using a CML method by using the OOB converting unit according to another embodiment of the present invention.
  • the left drawing of FIG. 6 shows an operation of applying an authentication code CV to an OOB function
  • the right drawing of FIG. 6 shows a case that a medium value O generated through an OOB visual channel flickers on an LED and is displayed thereon.
  • a wireless communication terminal having no display screen communicates with an external LED display device to represent a value of the authentication code CV by turning on or off the LED.
  • the OOB converting unit 150 extracts a k-bit authentication code from a least significant bit (LSB) by 1-bit to allocate the k-bit authentication code to turn-on and turn-off values of the LED. For example, the OOB converting unit 150 sets 1 of a bitstream to a turn-on value and 0 of the bitstream to a turn-off value.
  • LSB least significant bit
  • FIG. 7 is a view illustrating a state in which the medium value of an OOB function obtained using the operation of FIG. 6 is displayed on an LED.
  • the OOB converting unit 150 generates medium values LD 0 , LD 1 , . . . , and LD K that are used to determine turning on/off of the LED and transmits the generated medium values LD 0 , LD 1 , . . . , and LD K to an LED display device through serial communication.
  • the LED display device turns on or off the LED according to a corresponding medium value.
  • the user can conveniently check exchange of a session key only from a turn-on or turn-off state of the LED.
  • FIG. 8 is a view illustrating an operation of obtaining a medium value using a comparing music (CM) method by using the OOB converting unit according to another embodiment of the present invention.
  • the left drawing of FIG. 8 shows an operation of applying an authentication code CV to an OOB function
  • the right drawing of FIG. 8 shows a case that a medium value O is generated in the form of an index of a music file through an OOB auditory channel.
  • FIG. 9 illustrates a screen on which a music file is played according to the medium value of an OOB function obtained using the operation of FIG. 8 .
  • the OOB converting unit 150 obtains a medium value O in the form of an index of a music file from a k-bit authentication code. Then, a music file way stored in a wireless communication terminal is played according to an index value.
  • the authentication code is k-bit
  • 2 k music files are stored.
  • the authentication code CV is 0011
  • a music file corresponding to a third index that corresponds to a decimal number value of the authentication code CV is played.
  • the user can conveniently check exchange of a session key only from short melody.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Disclosure relates to a method of sharing a session key between wireless communication terminals using a variable-length authentication code. The method includes: generating a public key by using an own private key; generating a message including the public key and a first random number and encoding the message using an own secret key to exchange an encrypted message with the other terminal; decoding the encrypted message of the other terminal by receiving a secret key of the other terminal; generating an authentication code by calculating the first random number and a second random number included in the decoded message; obtaining a medium value from the authenticated code; and generating a session key by using a public key included in the decoded message of the other terminal.

Description

    TECHNICAL FIELD
  • The present invention relates to a method of sharing a session key between wireless communication terminals using a variable-length authentication code, and more particularly, to a method of sharing a session key between wireless communication terminals using a variable-length authentication code, whereby the session key can be shared in a state in which high security between near-distance wireless communication terminals is maintained.
  • BACKGROUND ART
  • Popularization of smartphones results in quantitative and qualitative expansion of applications that utilize mobility and computing capability of the smartphones. A payment service application using a mobile phone among many mobile applications has been spotlighted as service that may give much convenience to users. In the payment service application, various payment means, such as a mobile wallet, are integrated in one application so that various payment services can be conveniently provided to users through a smartphone. There are several payment methods using the smartphone, but a payment service of the mobile wallet is carried out through wireless communication between various near-distance wireless terminals. However, wireless communication is basically vulnerable to attack. Thus, a secure session management technique between near-distance terminals is positively necessary to carry out various services using a mobile terminal.
  • A technique of sharing a secret key between both communication terminals is necessary for secure session management. The most known method of sharing a secret key is a Diffie-Hellman (DH) protocol, which is vulnerable to man-in-the-middle attack. Many key exchanging techniques including a station-to-station (STS) protocol have been proposed so as to solve the problem of man-in-the-middle attack. However, since these key exchanging techniques including a STS protocol require a previously-shared value or a trusted third party (TTP), they are not suitable for use in a mobile payment service. This is because it is difficult for a payment service using a mobile phone to have a previously-shared value with various communication terminals or to have a common TTP, such as a Public Key Infrastructure (PKI).
  • In addition, when a hash value relating to a shared key (session key) established through a DH protocol is used as an authentication code, the size of the authentication code is too large to be used in an out-of-band (OOB) channel, and the hash value is vulnerable to pre-image attack.
  • DETAILED DESCRIPTION OF THE INVENTION Technical Problem
  • The present invention provides a method of sharing a session key between wireless communication terminals using a variable-length authentication code, whereby the session key can be shared in a state in which high security between near-distance wireless communication terminals is maintained.
  • Technical Solution
  • According to an aspect of the present invention, there is provided a method of sharing a session key between wireless communication terminals based on a Diffie-Hellman (DH) protocol, the method including: generating a public key by using an own private key; generating a message including the public key and a first random number and encoding the message using an own secret key to exchange an encrypted message with the other terminal; decoding the encrypted message of the other terminal by receiving a secret key of the other terminal; generating an authentication code by calculating the first random number and a second random number included in the decoded message; obtaining a medium value from the authenticated code; and generating a session key by using a public key included in the decoded message of the other terminal.
  • The message may further include an identifier and a reflection attack verification value.
  • The method may further include checking a reflection attack verification value of the other terminal included in the decoded message.
  • The secret key may be a disposable key, and the first and second random numbers may be comprised of bit streams having a value of 0 or 1.
  • The generating of the authentication code may include generating an authentication code by performing an exclusive OR operation on the first random number and the second random number.
  • The authentication code may be divided into n bits (where n is a natural number of 2 or more), the divided authentication code may correspond to one grid, and each grid may be indicated by one color.
  • The obtaining of the medium value from the authentication code may include: dividing the authentication code into 2 or more bits and inputting the divided authentication code to an out-of-band (OOB) function to obtain the medium value; and displaying the medium value on a screen including a plurality of grids.
  • The number S′ of grids required to display the medium value may be obtained by the following equation:
  • S = S log 2 k ,
  • where S is the number of grids required when the number of colors for displaying the medium value is 2, k is the number of colors used to display the medium value and is 2m (where m is a number of bits to the divided authentication code).
  • The obtaining of the medium value from the authentication code may include: inputting the authentication code to an OOB function to obtain the medium value; and controlling a plurality of light emitting diodes (LEDs) to turn on or off according to the medium value.
  • The obtaining of the medium value from the authentication code may include: inputting the authentication code to an OOB function to obtain the medium value; and playing a stored sound source file according to the medium value.
  • According to another aspect of the present invention, there is provided a wireless communication terminal for sharing a session key with the other terminal based on a Diffie-Hellman (DH) protocol, the wireless communication terminal including: a storage unit including a public key generated by using an own private key; an encoding unit generating a message including the public key and a first random number and encoding the message using an own secret key to exchange an encrypted message with the other terminal; a decoding unit decoding the encrypted message of the other terminal by receiving a secret key of the other terminal; an authentication code generating unit generating an authentication code by calculating the first random number and a second random number included in the decoded message; an out-of-band (OOB) converting unit obtaining a medium value from the authenticated code; and a session key generating unit generating a session key by using a public key included in the decoded message of the other terminal.
  • Effects of the Invention
  • As described above, according to the present invention, since an authentication code having a short length is used, increased usability can be expected when an authentication technique is used through an OOB channel. In addition, since adjustment of the length of the authentication code is flexible, the length of the authentication code can be adjusted according to a level of a security need of an application so that a compromise effect of usability and security can be attained. Furthermore, various authentication methods, such as a comparing color barcode (CCB) method, a comparing multi LEDs (CML) method, and a comparing music (CM) method, are provided according to various usage environments of a wireless communication terminal so that direct session key authentication can be more easily performed.
  • DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a view illustrating a structure of a wireless communication terminal according to an embodiment of the present invention;
  • FIG. 2 is a flowchart illustrating a method of setting a session key between wireless communication terminals according to an embodiment of the present invention;
  • FIG. 3 is a flowchart illustrating the method of setting a session key between wireless communication terminals illustrated in FIG. 2 in more detail;
  • FIG. 4 is a view illustrating an operation of obtaining a medium value using a comparing color barcode (CCB) method by using an out-of-band (OOB) converting unit according to an embodiment of the present invention;
  • FIG. 5 is a view illustrating a state in which the medium value of an OOB function obtained using the operation of FIG. 4 is displayed on a screen;
  • FIG. 6 is a view illustrating an operation of obtaining a medium value using a comparing multi LEDs (CML) method by using the OOB converting unit according to another embodiment of the present invention;
  • FIG. 7 is a view illustrating a state in which the medium value of an OOB function obtained using the operation of FIG. 6 is displayed on an LED;
  • FIG. 8 is a view illustrating an operation of obtaining a medium value using a comparing music (CM) method by using the OOB converting unit according to another embodiment of the present invention; and
  • FIG. 9 illustrates a screen on which a music file is played according to the medium value of an OOB function obtained using the operation of FIG. 8.
  • BEST MODE OF THE INVENTION
  • The present invention will now be described more fully with reference to the accompanying drawings, in which exemplary embodiments of the invention are shown, so that one of ordinary skill in the art can easily embody the invention.
  • FIG. 1 is a view illustrating a structure of a wireless communication terminal according to an embodiment of the present invention. A wireless communication terminal 100 illustrated in FIG. 1 that is a device for sharing a session key between near-distance wireless communication terminals may refer to a mobile station (MS), a mobile terminal (MT), a subscriber station (SS), a portable subscriber station (PSS), user equipment (UE), or an access terminal (AT) or may include functions of all or part of the MT, the SS, the PSS, and the UE.
  • The wireless communication terminal 100 according to the current embodiment of the present invention includes a storage unit 110, an encoding unit 120, a decoding unit 130, an authentication code generating unit 140, an out-of-band (OOB) converting unit 150, and a session key generating unit 160.
  • The storage unit 110 stores a public key, an identifier identification (ID), a random number, and a secret key, which are generated using an own private key of the wireless communication terminal 100, and stores the random number and the secret key that are randomly selected.
  • The encoding unit 120 generates a message including an attack verification value, the identifier ID, the public key, and the random number, and encodes the generated message by using an own secret key to exchange the encrypted message with an encrypted message of the other terminal. In this case, a symmetric-key encryption algorithm is used to transmit values of the random number and the public key.
  • The decoding unit 130 decodes the encrypted message of the other terminal by using a received secret key of the other terminal and authenticates the attack verification value of the decoded message. The authentication code generating unit 140 generates an authentication code by calculating a random number of the other terminal included in the decoded message and an own random number.
  • Here, the authentication code generating unit 140 uses an exclusive OR value of the random number as the authentication code, instead of a hash value of a shared key (session key).
  • The OOB converting unit 150 obtains a medium value by applying the authentication code to an OOB function. Here, color barcodes are used to perform a method of authenticating the medium value between two terminals, whereby the session key can be authenticated by simply comparing coidentity of the color barcodes, not by recognizing the medium value through a camera module, like in an existing black-and-white barcode.
  • The session key generating unit 160 generates a session key by using a public key of the other terminal included in the decoded message.
  • FIG. 2 is a flowchart illustrating a method of setting a session key between wireless communication terminals according to an embodiment of the present invention, and FIG. 3 is a flowchart illustrating the method of setting a session key between wireless communication terminals illustrated in FIG. 2 in more detail. For convenience of explanation, in FIGS. 2 and 3, wireless communication terminals according to the current embodiment of the present invention are represented by a first terminal and a second terminal, and the first terminal and the second terminal are terminals that perform near field communication (NFC) by using Zigbee, RFID, Bluetooth based on the Diffie-Hellman (DH) protocol.
  • First, in Phase 1, identifier IDs, e.g., e-mail addresses that a human being can identify and DH public key values PKA and PKB are set in the first terminal and the second terminal (S211, S212). Here, the identifier IDs set in the first terminal and the second terminal may be represented by IDA and IDB, as illustrated in FIG. 3. Also, the DH public key value PKA set in the first terminal is generated using a private key (a) of the first terminal (gamodp), and the DH public key value PKB set in the second terminal is generated using a private key (b) of the second terminal (gbmodp).
  • Also, the first terminal and the second terminal select k-bit random numbers NA and NB and t-bit disposable secret keys SKA and SKB randomly (S213, S214). Here, since the random numbers NA and NB are comprised of k bit steams having a bit value of 0 or 1, the random numbers NA and NB comprised of various bit streams can be generated by adjusting a k-value. Also, the disposable secret keys SKA and SKB are comprised of t bit streams having a bit value of 0 or 1, and values of the disposable secret keys SKA and SKB may vary frequency.
  • Next, in public key exchanging (Phase 2), the first terminal and the second terminal generate messages mA and mB so as to exchange the public key values PKA and PKB with each other (S215, S216).
  • Here, the messages mA and mB include an attack verification value (0 or 1) for verifying a reflection attack, own IDs IDA and IDB, own public key values PKA and PKB, and own random numbers NA and NB. The message mA generated by the first terminal may be represented by 0∥IDA∥PKA∥NA, and the message mB generated by the second terminal may be represented by 1∥IDB∥PKB∥NB. Here, a reflection attack verification value 0 means a transmission terminal, and a reflection attack verification value 1 means a receipt terminal.
  • Next, the first terminal and the second terminal encode the generated messages mA and mB by using own secret keys SKA and SKB (S217, S218). The first terminal and the second terminal exchange messages E(SKA, mA) and E(SKB, mB) that are encoded by the secret keys SKA and SKB, with each other (S219).
  • The first terminal transmits own secret key SKA to the second terminal, if it receives the encrypted message E(SKB, mB) from the second terminal (S220). The second terminal that receives the secret key SKA of the first terminal decodes the encrypted message E(SKA, mA) by using the secret key SKA (D(SKA, E(SKA, mA) (S221).
  • After the second terminal checks whether a reflection attack verification value of 0 is present in a decoded message m′A (S222), if it is checked that the reflection attack verification value of 0 is present in the decoded message m′A, the second terminal transmits own secret key SKB to the first terminal (S223).
  • The first terminals that receives the secret key SKB of the second terminal decodes the encrypted message E(SKB, mB) by using the secret key SKB (D(SKB, E(SKB, mB) (S224). The first terminal checks whether a reflection attack verification value of 1 is present in a decoded message m′B (S225).
  • In this way, if the first terminal and the second terminal succeed in reflection attack verification, the first terminal and the second terminal calculate their own random number values and transmitted random number values to generate authentication codes (S226, S227). That is, the second terminal calculates an own random number value NB and a random number value N′A received from the first terminal to generate an authentication code CVB, and the first terminal calculates an own random number value NA and a random number value N′B received from the second terminal to generate an authentication code CVA. According to an embodiment of the present invention, the authentication code generating unit 140 calculates random number values by using exclusive OR.
  • In OOB channel authentication (Phase 3), the first terminal and the second terminal apply the authentication codes CVA and CVB to an OOB function so as to generate medium values OA and OB of an OOB channel that a user can directly recognize visually or auditorily (S228, S229). That is, the first terminal applies the authentication code CVA to the OOB function to obtain the output medium value OA, and the second terminal applies the authentication code CVB to the OOB function to obtain the output medium value OB.
  • Then, a user of the first terminal and a user of the second terminal compare the output medium values OA and OB of the OOB channel with each other and determine whether they are identical to each other, and if it is determined that they are identical to each other, the user of the first terminal and the user of the second terminal authenticate that public keys of the first and second terminals have been normally exchanged with each other (S230). Here, the OOB channel includes a visual channel and an auditory channel that use a visual sense and an auditory sense of the human being. When the OOB channel is an auditory channel, a medium value is represented by melody, music, and an effect sound, and when the OOB channel is a visual channel, a medium value is represented by a barcode and color.
  • As in the current embodiment of the present invention, according to paring technology using an OOB channel, since the human being can select a first terminal and a second terminal that are object terminals and can verify authentication information of the selected object terminals, it can be identified that an attacker modulates a message or counterfeits a device to be authenticated without a trusted third party (TTP).
  • Last, in session key installation (Phase 4), if authentication on public key exchange between the first terminal and the second terminal has succeeded, the first terminal and the second terminal generate a session key KAB between the first terminal and the second terminal and store the session key KAB together with a received ID of the other terminal as a pair (S231, S232).
  • That is, the first terminal generates a shared session key (KAB=(PKB)amodp) by using a received public key PKB of the second terminal, and the second terminal generates a shared session key (KAB=(PKA)bmodp) by using a received public key PKA of the first terminal.
  • In this way, according to the current embodiment of the present invention, the first terminal and the second terminal can share the session key KAB by using a symmetric-key encryption algorithm based on the DH protocol, instead of hash.
  • In particular, according to the current embodiment of the present invention, in OOB channel authentication (Phase 3), one among a comparing color barcode (CCB) method, a comparing multi LEDs (CML) method, and a comparing music (CM) method can be utilized. Thus, a method of authenticating an OOB channel will now be described with reference to FIGS. 4 through 9.
  • FIG. 4 is a view illustrating an operation of obtaining a medium value using a CCB method by using an OOB converting unit according to an embodiment of the present invention. In more detail, the left drawing of FIG. 4 shows an operation of applying an authentication code CV to an OOB function, and the right drawing of FIG. 4 shows that a medium value O is visually displayed on a screen of a terminal through an OOB visual channel. Here, the OOB function is a function to convert an input value into a medium value having a visual or auditory shape.
  • That is, as shown on the left bottom of FIG. 4, it is assumed that the authentication code CV is comprised of (k+1) bits (0˜k). Then, the authentication code CV is divided into 2 bits and is input to the OOB converting unit 150 (C00, C01, CO2, . . . Cij), and the OOB to converting unit 150 represents an output medium value of the OOB function on a grid i×j through previously-designated four colors. For example, the OOB converting unit 150 may set 00-bit to red color 1, 01-bit to white color 2, 10-bit to blue color 3, and 11-bit to black color 4 and may display color corresponding to the authentication code CV that is divided into 2 bits and is input to the OOB converting unit 150 on a screen of the grid i×j. In this case, color selection may be performed to smoothly differentiate between colors based on the relationship of compensation color.
  • Here, the authentication code CV is divided into 2 or more bits, and when the authentication code CV is divided into m bits, the authentication code may be represented by 2m colors. Also, as a m-value increases, the number or size of grids displayed on the screen may decrease. The divided authentication code CV is represented in one grid, and each grid is indicated by one color.
  • Thus, according to the related art, the authentication code CV is not divided and thus a medium value can be displayed by a black-and-white grid (or barcode) of two colors, whereas, according to an embodiment of the present invention, the authentication code CV is divided into 2 or more bits and thus the medium value can be displayed with various colors and the number or size of grids can be remarkably reduced.
  • That is, when the black-and-white grid is used, 0-bit is represented by black, and 1-bit is represented by white, whereas, when various colors like in the embodiment of the present invention are used, several bits can be represented by one color and thus the number of size of grids can be drastically reduced.
  • If the number of grids required to display the medium value by using the black-and-white grid, like in the related art, is S, the number S′ of grids required to display the medium is reduced, as shown in Equation 1:
  • S = S log 2 k , ( 1 )
  • where k is the number of colors used to display the medium value and is 2m (where m is a number of bits to the divided authentication code CV) has a value of 2 or more.
  • Using so many colors enables reducing the number or size of color grids (or barcodes), but the user may undergo a difficulty in performing authentication. Thus, the user adjusts the number of grids and the number of colors appropriately so that convenience of a public key exchange authentication procedure can be achieved.
  • FIG. 5 is a view illustrating a state in which the medium value of an OOB function obtained using the operation of FIG. 4 is displayed on a screen. In FIG. 5, the medium value of the OOB function is displayed on an operating screen when a random number having a length of 128 bits is used as the authentication code CV, by using four colors.
  • Thus, in the black-and-white grid according to the related art, 128 grids are required, whereas, when a color grid according to an embodiment of the present invention is used, the authentication code can be represented by using only 64 grids that is a half of 128 grids required in the related art, as checked from Equation 1.
  • In this way, according to an embodiment of the present invention, since an authentication code having a short length is used, increased usability can be expected when an authentication technique is used through the OOB channel. Also, since adjustment of the length of the authentication code is flexible, the length of the authentication code is adjusted according to a level of a security need of an application so that a compromise effect of usability and security can be attained. Also, since a color grid can be represented by the size or number of grids that is a half of the size or number of existing black-and-white grids, the user can perform session key authentication more easily.
  • FIG. 6 is a view illustrating an operation of obtaining a medium value using a CML method by using the OOB converting unit according to another embodiment of the present invention. In more detail, the left drawing of FIG. 6 shows an operation of applying an authentication code CV to an OOB function, and the right drawing of FIG. 6 shows a case that a medium value O generated through an OOB visual channel flickers on an LED and is displayed thereon.
  • That is, according to the CML method, a wireless communication terminal having no display screen communicates with an external LED display device to represent a value of the authentication code CV by turning on or off the LED.
  • If the authentication code CV is input to the OOB converting unit 150, the OOB converting unit 150 extracts a k-bit authentication code from a least significant bit (LSB) by 1-bit to allocate the k-bit authentication code to turn-on and turn-off values of the LED. For example, the OOB converting unit 150 sets 1 of a bitstream to a turn-on value and 0 of the bitstream to a turn-off value.
  • FIG. 7 is a view illustrating a state in which the medium value of an OOB function obtained using the operation of FIG. 6 is displayed on an LED. The OOB converting unit 150 generates medium values LD0, LD1, . . . , and LDK that are used to determine turning on/off of the LED and transmits the generated medium values LD0, LD1, . . . , and LDK to an LED display device through serial communication. The LED display device turns on or off the LED according to a corresponding medium value. Thus, the user can conveniently check exchange of a session key only from a turn-on or turn-off state of the LED.
  • FIG. 8 is a view illustrating an operation of obtaining a medium value using a comparing music (CM) method by using the OOB converting unit according to another embodiment of the present invention. In more detail, the left drawing of FIG. 8 shows an operation of applying an authentication code CV to an OOB function, and the right drawing of FIG. 8 shows a case that a medium value O is generated in the form of an index of a music file through an OOB auditory channel. FIG. 9 illustrates a screen on which a music file is played according to the medium value of an OOB function obtained using the operation of FIG. 8.
  • According to the CM method, if the authentication code CV is input to the OOB converting unit 150, the OOB converting unit 150 obtains a medium value O in the form of an index of a music file from a k-bit authentication code. Then, a music file way stored in a wireless communication terminal is played according to an index value. Here, if the authentication code is k-bit, 2k music files are stored. For example, if the authentication code CV is 0011, a music file corresponding to a third index that corresponds to a decimal number value of the authentication code CV, is played. Thus, the user can conveniently check exchange of a session key only from short melody.
  • While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present invention as defined by the following claims.

Claims (18)

1. A method of sharing a session key between wireless communication terminals based on a Diffie-Hellman (DH) protocol, the method comprising:
generating a public key by using an own private key;
generating a message including the public key and a first random number and encoding the message using an own secret key to exchange an encrypted message with the other terminal;
decoding the encrypted message of the other terminal by receiving a secret key of the other terminal;
generating an authentication code by calculating the first random number and a second random number included in the decoded message;
obtaining a medium value from the authenticated code; and
generating a session key by using a public key included in the decoded message of the other terminal.
2. The method of claim 1, wherein the message further comprises an identifier and a reflection attack verification value.
3. The method of claim 2, further comprising checking a reflection attack verification value of the other terminal included in the decoded message.
4. The method of claim 3, wherein the secret key is a disposable key, and the first and second random numbers are comprised of bit streams having a value of 0 or 1.
5. The method of claim 4, wherein the generating of the authentication code comprises generating an authentication code by performing an exclusive OR operation on the first random number and the second random number.
6. The method of claim 5, wherein the authentication code is divided into n bits (where n is a natural number of 2 or more), and
the divided authentication code corresponds to one grid, and
each grid is indicated by one color.
7. The method of claim 6, wherein the obtaining of the medium value from the authentication code comprises:
dividing the authentication code into 2 or more bits and inputting the divided authentication code to an out-of-band (OOB) function to obtain the medium value; and
displaying the medium value on a screen including a plurality of grids.
8. The method of claim 7, wherein the number S′ of grids required to display the medium value is obtained by the following equation:
S = S log 2 k ,
where S is the number of grids required when the number of colors for displaying the medium value is 2, k is the number of colors used to display the medium value and is 2m (where m is a number of bits to the divided authentication code).
9. The method of claim 6, wherein the obtaining of the medium value from the authentication code comprises:
inputting the authentication code to an OOB function to obtain the medium value; and
controlling a plurality of light emitting diodes (LEDs) to turn on or off according to the medium value.
10. The method of claim 6, wherein the obtaining of the medium value from the authentication code comprises:
inputting the authentication code to an OOB function to obtain the medium value; and
playing a stored sound source file according to the medium value.
11. A wireless communication terminal for sharing a session key with the other terminal based on a Diffie-Hellman (DH) protocol, the wireless communication terminal comprising:
a storage unit comprising a public key generated by using an own private key;
an encoding unit generating a message including the public key and a first random number and encoding the message using an own secret key to exchange an encrypted message with the other terminal;
a decoding unit decoding the encrypted message of the other terminal by receiving a secret key of the other terminal;
an authentication code generating unit generating an authentication code by calculating the first random number and a second random number included in the decoded message;
an out-of-band (OOB) converting unit obtaining a medium value from the authenticated code; and
a session key generating unit generating a session key by using a public key included in the decoded message of the other terminal.
12. The wireless communication terminal of claim 11, wherein the message further comprises an identifier and a reflection attack verification value.
13. The wireless communication terminal of claim 12, wherein the decoding unit checks a reflection attack verification value of the other terminal included in the decoded message.
14. The wireless communication terminal of claim 13, wherein the secret key is a disposable key, and the first and second random numbers are comprised of bit streams having a value of 0 or 1.
15. The wireless communication terminal of claim 14, wherein the authentication code generating unit generates an authentication code by performing an exclusive OR operation on the first random number and the second random number.
16. The wireless communication terminal of claim 15, wherein the authentication code is divided into n bits (where n is a natural number of 2 or more), and
the divided authentication code corresponds to one grid, and
each grid is indicated by one color.
17. The wireless communication terminal of claim 16, wherein the OOB converting unit obtains the medium value from the authentication code divided into 2 or more bits and inputted to the OOB converting unit and displays the medium on a screen including a plurality of grids.
18. The wireless communication terminal of claim 16, wherein the number S′ of grids required to display the medium value is obtained by the following equation:
S = S log 2 k ,
where S is the number of grids required when the number of colors for displaying the medium value is 2, k is the number of colors used to display the medium value and is 2m (where m is a number of bits to the divided authentication code).
US14/000,645 2011-04-26 2012-04-06 Method of sharing a session key between wireless communication terminals using a variable-length authentication code Expired - Fee Related US9078126B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
KR1020110038900A KR101233254B1 (en) 2011-04-26 2011-04-26 Session key sharing method between Wireless Communication devices by using variable length of authentication code
KR10-2011-0038900 2011-04-26
PCT/KR2012/002644 WO2012148096A2 (en) 2011-04-26 2012-04-06 Method of sharing a session key between wireless communication terminals using a variable-length authentication code

Publications (2)

Publication Number Publication Date
US20130332739A1 true US20130332739A1 (en) 2013-12-12
US9078126B2 US9078126B2 (en) 2015-07-07

Family

ID=47072853

Family Applications (1)

Application Number Title Priority Date Filing Date
US14/000,645 Expired - Fee Related US9078126B2 (en) 2011-04-26 2012-04-06 Method of sharing a session key between wireless communication terminals using a variable-length authentication code

Country Status (3)

Country Link
US (1) US9078126B2 (en)
KR (1) KR101233254B1 (en)
WO (1) WO2012148096A2 (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140012763A1 (en) * 2012-07-09 2014-01-09 The Western Union Company Money transfer fraud prevention methods and systems
WO2015106248A1 (en) * 2014-01-13 2015-07-16 Visa International Service Association Efficient methods for protecting identity in authenticated transmissions
WO2015149723A1 (en) * 2014-04-03 2015-10-08 华为终端有限公司 Method, device and system for establishing secure connection
US9301138B2 (en) * 2012-08-21 2016-03-29 Ricoh Company, Ltd. Wireless communication apparatus, recording medium, and method
CN105516978A (en) * 2015-12-04 2016-04-20 上海斐讯数据通信技术有限公司 Wireless protected setup negotiation method and system
US9542136B2 (en) * 2015-03-19 2017-01-10 Ricoh Company, Ltd. Communication control system, communication control apparatus, and communication control method
US20170078090A1 (en) * 2015-09-14 2017-03-16 Yahoo! Inc. Method and system for exchanging cryptographic keys with an unauthenticated device
WO2017172106A1 (en) * 2016-03-31 2017-10-05 Intel Corporation Point-and-connect bluetooth pairing
US9813245B2 (en) 2014-08-29 2017-11-07 Visa International Service Association Methods for secure cryptogram generation
US9942034B2 (en) 2015-02-13 2018-04-10 Visa International Service Association Confidential communication management
US10461933B2 (en) 2015-01-27 2019-10-29 Visa International Service Association Methods for secure credential provisioning
US10505909B2 (en) 2016-12-21 2019-12-10 Intel Corporation Dual physical channel secure connection
US10574633B2 (en) 2014-06-18 2020-02-25 Visa International Service Association Efficient methods for authenticated communication
US10917767B2 (en) 2016-03-31 2021-02-09 Intel Corporation IOT device selection
US10958424B1 (en) * 2017-11-02 2021-03-23 Amazon Technologies, Inc. Mechanism to allow third party to use a shared secret between two parties without revealing the secret
US10972257B2 (en) 2016-06-07 2021-04-06 Visa International Service Association Multi-level communication encryption
CN112765635A (en) * 2021-01-27 2021-05-07 河南大学 Image encryption method based on coupling mapping grid model
FR3118225A1 (en) * 2020-12-22 2022-06-24 Idakto Method and device for generating authentication information for a secure entity and associated identity verification method and device

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101452124B1 (en) * 2013-08-01 2014-10-16 덕성여자대학교 산학협력단 Method for Device Authentication and Session Key Generation Based on Encryption in Internet of Things
US10523490B2 (en) * 2013-08-06 2019-12-31 Agilepq, Inc. Authentication of a subscribed code table user utilizing optimized code table signaling
WO2015037886A1 (en) * 2013-09-11 2015-03-19 Kim Deoksang Device and method for authenticating smart chip
US10931456B2 (en) * 2014-06-26 2021-02-23 Comcast Cable Communications, Llc Secure router authentication
WO2016004185A1 (en) 2014-07-02 2016-01-07 OptCTS, Inc. Data recovery utilizing optimized code table signaling
KR20160132302A (en) 2015-05-09 2016-11-17 삼성전자주식회사 Method for sharing key between devices using physical access restriction
JP2019518397A (en) 2016-06-06 2019-06-27 アジャイルピーキュー, インコーポレイテッド Data conversion system and method
US10574451B2 (en) * 2017-10-19 2020-02-25 Bank Of America Corporation Method and apparatus for perfect forward secrecy using deterministic hierarchy
CN109039657B (en) * 2018-11-02 2021-01-08 美的集团股份有限公司 Key agreement method, device, terminal, storage medium and system

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4089125A (en) * 1976-12-10 1978-05-16 Enz Vera G Color-assist teaching aid and method therefor
US20030163719A1 (en) * 2002-02-26 2003-08-28 Fujitsu Limited Removable disk device with identification information
US6920559B1 (en) * 2000-04-28 2005-07-19 3Com Corporation Using a key lease in a secondary authentication protocol after a primary authentication protocol has been performed
US20090068985A1 (en) * 2007-09-12 2009-03-12 At&T Knowledge Ventures, L.P. Method and apparatus for end-to-end mobile user security
US20090222659A1 (en) * 2008-03-03 2009-09-03 Sony Corporation Communication device and communication method
US20100104094A1 (en) * 2007-01-19 2010-04-29 Mitsubishi Electric Corporation Ciphertext generating apparatus, cryptographic communication system, and group parameter generating apparatus
US20110202982A1 (en) * 2007-09-17 2011-08-18 Vidoop, Llc Methods And Systems For Management Of Image-Based Password Accounts
US20130243187A1 (en) * 2012-02-21 2013-09-19 Roarke Horstmeyer Physical key-protected one time pad
US8600063B2 (en) * 2008-12-05 2013-12-03 Panasonic Electric Works Co., Ltd. Key distribution system
US8627088B2 (en) * 2010-02-10 2014-01-07 Authernative, Inc. System and method for in- and out-of-band multi-factor server-to-user authentication

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004051921A1 (en) 2002-12-03 2004-06-17 Matsushita Electric Industrial Co., Ltd. Key sharing system, shared key creation device, and shared key restoration device
KR100571820B1 (en) 2003-10-20 2006-04-17 삼성전자주식회사 Conference session key distribution method on ID-based cryptographic system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4089125A (en) * 1976-12-10 1978-05-16 Enz Vera G Color-assist teaching aid and method therefor
US6920559B1 (en) * 2000-04-28 2005-07-19 3Com Corporation Using a key lease in a secondary authentication protocol after a primary authentication protocol has been performed
US20030163719A1 (en) * 2002-02-26 2003-08-28 Fujitsu Limited Removable disk device with identification information
US20100104094A1 (en) * 2007-01-19 2010-04-29 Mitsubishi Electric Corporation Ciphertext generating apparatus, cryptographic communication system, and group parameter generating apparatus
US20090068985A1 (en) * 2007-09-12 2009-03-12 At&T Knowledge Ventures, L.P. Method and apparatus for end-to-end mobile user security
US20110202982A1 (en) * 2007-09-17 2011-08-18 Vidoop, Llc Methods And Systems For Management Of Image-Based Password Accounts
US20090222659A1 (en) * 2008-03-03 2009-09-03 Sony Corporation Communication device and communication method
US8600063B2 (en) * 2008-12-05 2013-12-03 Panasonic Electric Works Co., Ltd. Key distribution system
US8627088B2 (en) * 2010-02-10 2014-01-07 Authernative, Inc. System and method for in- and out-of-band multi-factor server-to-user authentication
US20130243187A1 (en) * 2012-02-21 2013-09-19 Roarke Horstmeyer Physical key-protected one time pad

Cited By (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140012763A1 (en) * 2012-07-09 2014-01-09 The Western Union Company Money transfer fraud prevention methods and systems
US11037147B2 (en) * 2012-07-09 2021-06-15 The Western Union Company Money transfer fraud prevention methods and systems
US9301138B2 (en) * 2012-08-21 2016-03-29 Ricoh Company, Ltd. Wireless communication apparatus, recording medium, and method
US10666428B2 (en) 2014-01-13 2020-05-26 Visa International Service Association Efficient methods for protecting identity in authenticated transmissions
WO2015106248A1 (en) * 2014-01-13 2015-07-16 Visa International Service Association Efficient methods for protecting identity in authenticated transmissions
US10313110B2 (en) 2014-01-13 2019-06-04 Visa International Service Association Efficient methods for protecting identity in authenticated transmissions
US10129020B2 (en) 2014-01-13 2018-11-13 Visa International Service Association Efficient methods for protecting identity in authenticated transmissions
US9967090B2 (en) 2014-01-13 2018-05-08 Visa International Service Association Efficient methods for protecting identity in authenticated transmissions
US9647832B2 (en) 2014-01-13 2017-05-09 Visa International Service Association Efficient methods for protecting identity in authenticated transmissions
CN104980928A (en) * 2014-04-03 2015-10-14 华为终端有限公司 Method, equipment and system used for establishing secure connection
WO2015149723A1 (en) * 2014-04-03 2015-10-08 华为终端有限公司 Method, device and system for establishing secure connection
US10218501B2 (en) 2014-04-03 2019-02-26 Huawei Device (Dongguan) Co., Ltd. Method, device, and system for establishing secure connection
US10574633B2 (en) 2014-06-18 2020-02-25 Visa International Service Association Efficient methods for authenticated communication
US11394697B2 (en) 2014-06-18 2022-07-19 Visa International Service Association Efficient methods for authenticated communication
US12021850B2 (en) 2014-06-18 2024-06-25 Visa International Service Association Efficient methods for authenticated communication
US10389533B2 (en) 2014-08-29 2019-08-20 Visa International Service Association Methods for secure cryptogram generation
US11588637B2 (en) 2014-08-29 2023-02-21 Visa International Service Association Methods for secure cryptogram generation
US12021987B2 (en) 2014-08-29 2024-06-25 Visa International Service Association Methods for secure cryptogram generation
US11032075B2 (en) 2014-08-29 2021-06-08 Visa International Service Association Methods for secure cryptogram generation
US9813245B2 (en) 2014-08-29 2017-11-07 Visa International Service Association Methods for secure cryptogram generation
US10461933B2 (en) 2015-01-27 2019-10-29 Visa International Service Association Methods for secure credential provisioning
US11201743B2 (en) 2015-01-27 2021-12-14 Visa International Service Association Methods for secure credential provisioning
US11856104B2 (en) 2015-01-27 2023-12-26 Visa International Service Association Methods for secure credential provisioning
US10652015B2 (en) 2015-02-13 2020-05-12 Visa International Service Association Confidential communication management
US9942034B2 (en) 2015-02-13 2018-04-10 Visa International Service Association Confidential communication management
US10218502B2 (en) 2015-02-13 2019-02-26 Visa International Service Association Confidential communication management
US9542136B2 (en) * 2015-03-19 2017-01-10 Ricoh Company, Ltd. Communication control system, communication control apparatus, and communication control method
US10069623B2 (en) * 2015-09-14 2018-09-04 Oath Inc. Method and system for exchanging cryptographic keys with an unauthenticated device
US10333700B2 (en) 2015-09-14 2019-06-25 Oath Inc. Method and system for exchanging cryptographic keys with an unauthenticated device
US20170078090A1 (en) * 2015-09-14 2017-03-16 Yahoo! Inc. Method and system for exchanging cryptographic keys with an unauthenticated device
US10637652B2 (en) 2015-09-14 2020-04-28 Oath Inc. Method and system for exchanging cryptographic keys with an unauthenticated device
CN105516978A (en) * 2015-12-04 2016-04-20 上海斐讯数据通信技术有限公司 Wireless protected setup negotiation method and system
US10097948B2 (en) 2016-03-31 2018-10-09 Intel Corporation Point-and-connect bluetooth pairing
US10917767B2 (en) 2016-03-31 2021-02-09 Intel Corporation IOT device selection
WO2017172106A1 (en) * 2016-03-31 2017-10-05 Intel Corporation Point-and-connect bluetooth pairing
US10972257B2 (en) 2016-06-07 2021-04-06 Visa International Service Association Multi-level communication encryption
US10505909B2 (en) 2016-12-21 2019-12-10 Intel Corporation Dual physical channel secure connection
US10958424B1 (en) * 2017-11-02 2021-03-23 Amazon Technologies, Inc. Mechanism to allow third party to use a shared secret between two parties without revealing the secret
WO2022135952A1 (en) * 2020-12-22 2022-06-30 Idakto Method and device for generating authentication information for a secure entity and associated identity checking method and device
FR3118225A1 (en) * 2020-12-22 2022-06-24 Idakto Method and device for generating authentication information for a secure entity and associated identity verification method and device
CN112765635A (en) * 2021-01-27 2021-05-07 河南大学 Image encryption method based on coupling mapping grid model

Also Published As

Publication number Publication date
WO2012148096A2 (en) 2012-11-01
KR20120121429A (en) 2012-11-06
KR101233254B1 (en) 2013-02-14
WO2012148096A3 (en) 2013-01-10
US9078126B2 (en) 2015-07-07

Similar Documents

Publication Publication Date Title
US9078126B2 (en) Method of sharing a session key between wireless communication terminals using a variable-length authentication code
US10182255B2 (en) Method, terminal, and system for communication pairing of a digital television terminal and a mobile terminal
US10694374B2 (en) Electronic network device
US8621210B2 (en) Ad-hoc trust establishment using visual verification
US9398046B2 (en) Image-based man-in-the-middle protection in numeric comparison association models
CN105684344B (en) A kind of cipher key configuration method and apparatus
WO2017201809A1 (en) Communication method and system for terminal
Mirzadeh et al. Secure device pairing: A survey
EP3068091B1 (en) Network configuration method, and related device and system
CN101662360B (en) Short message service-based certificated symmetric key negotiation method
CN108270554B (en) Terminal pairing method and system
CN116366347A (en) Secure transmission method and device for signaling and SE chip
CN109309566A (en) A kind of authentication method, device, system, equipment and storage medium
US20090060188A1 (en) Determining security states using binary output sequences
WO2021109668A1 (en) Security authentication method, apparatus, and electronic device
Kovačević et al. Flashing displays: user‐friendly solution for bootstrapping secure associations between multiple constrained wireless devices
CN108599923A (en) The implementation method of data efficient safe transmission between cloud computing server
CN107690667A (en) Use the payment system and its method for user's non-repudiation of user terminal
CN1794631A (en) Sign device and method of digital sign
CN105282738A (en) Security authentication method for mobile terminal
CN104936176A (en) Network access verification implementation method and implementation system for mobile terminal
KR20130068199A (en) Mobile communication terminal and method
KR102501794B1 (en) Method for user authentication based on hash chain suitable for unmanned systems and electronic apparatus using it
KR101770044B1 (en) Generating method for complementary authentication key and authentication method for group communication based on complementary key
Kim et al. Providing secure mobile device pairing based on visual confirmation

Legal Events

Date Code Title Description
AS Assignment

Owner name: SOONGSIL UNIVERSITY RESEARCH CONSORTIUM TECHNO-PAR

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:YI, JEONG HYUN;MA, GUN-IL;LEE, HYEONG CHAN;REEL/FRAME:031058/0848

Effective date: 20130806

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment: 4

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20230707